2008 15th Asia-Pacific Software Engineering Conference

3-5 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 79
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (280 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message the from Program Committee Chairs

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2008, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Using Abstraction to Verify Arbitrary Temporal Properties

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB)

    Summary form only given. It is a known fact that finitary state abstraction methods (i.e. methods in which the abstract domain is finite), such as predicate abstraction, are inadequate for verifying general liveness properties or even termination of sequential programs. In this talk we will present an abstraction approach called ranking abstraction which is sound and complete for verifying all tem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond Agile: Smart

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB)

    Summary form only given. One of the most popular buzzwords in software development is agile. Today everyone wants to be agile. That is good! However, being agile is not enough. For several years Dr. Ivar Jacobson has expressed that the most important character you need to have to be a great software developer is to be smart. What does that mean? Most people know intuitively what does it mean for s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Refinement

    Publication Year: 2008, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Summary form only given. This paper presents a refinement calculus for service components. We model the behaviour of individual service by a guarded design, which enables one to separate the responsibility of clients from the commitment made by the system, and to identify a component by a set of failures and divergences. Protocols are introduced to coordinate the interactions between a component w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Early Filtering of Polluting Method Calls for Mining Temporal Specifications

    Publication Year: 2008, Page(s):9 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Temporal specifications can describe the legal call sequences of API libraries. With these specifications, verification tools can find defects in existing clients automatically. However, temporal specifications are often not provided due to the high cost of writing them manually or being out-of-date due to the rapid evolution of software. As API clients contain many usages of libraries including t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DRACULA: Detector of Data Races in Signals Handlers

    Publication Year: 2008, Page(s):17 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Data races can occur even in sequential programs due to asynchronous software interrupts (e.g., UNIX signals). In this paper, we propose and implement a new tool DRACULA that dynamically detects data races caused by UNIX signals. DRACULA has many positive characteristics like full-automation, no source code required, high scalability, and synchronization mechanism independence, which make DRACULA ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Diverse Design Pattern Variants

    Publication Year: 2008, Page(s):25 - 32
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    We propose a method for automatic detection of occurrences of design patterns. We also describe its proof-of-concept implementation and the results of comparative experiments with other tools. The method presented here is able to detect many nonstandard implementation variants of design patterns, while its efficiency is comparable to other state-of-the-art detection tools. Moreover, the method is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Unused Design Decisions in Open Source Java Software

    Publication Year: 2008, Page(s):33 - 40
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    A recent study on how inheritance is used in open source Java software revealed a surprising number of interfaces that were neither implemented nor extended. While innocent explanations for this exist (the interfaces are part of frameworks that only clients of the frameworks implement), it does raise the question of how much "dead code'' exists in applications. Dead code usually refers to code wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Model of Software Product Generative Process

    Publication Year: 2008, Page(s):43 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    We analyze the process of software development for large, object oriented, open source software systems. Such systems may be described as complex networks when suitable variables are properly identified. In particular we model the system growth through a Yule process which enable us to fit data extracted from freely available repositories. We consider quantities related to relevant properties of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Retrieval Method for Knowledge-Based Software Process Tailoring Using Structural Similarity

    Publication Year: 2008, Page(s):51 - 58
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Reuse of the software development process and its knowledge and experiences is a critical factor for the success of the software project. On the other hand, the software development process needs to be tailored to reflect the specific characteristics of the software project. So, if we can retrieve a similar process to a new project, process tailoring will be less costly and less error-prone becaus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Process Simulation Modeling: Facts, Trends and Directions

    Publication Year: 2008, Page(s):59 - 66
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Software process simulation modeling (SPSM) research has increased since the first ProSim workshop held in 1998 and Kellner, Madachy and Raffo (KMR) discussed the "why, what and how" of process simulation. This paper aims to assess how SPSM has evolved during the past 10 years in particular whether the reasons for SPSM, the simulation paradigms, tools, problem domains, and model scopes have change... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Investigation on Performance of Software Enhancement Projects in China

    Publication Year: 2008, Page(s):67 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    As two major performance measures, software productivity and quality convey critical information in supporting many decision making situations during project planning, management, as well as process/organization benchmarking processes. However, there is a lack of investigation on these performance measures with respect to enhancement projects, this leads to, in many enhancement/maintenance cases, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Nonlinear Approach to Modeling of Software Aging in a Web Server

    Publication Year: 2008, Page(s):77 - 84
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Software aging refers to the phenomenon that the performance degradation, increasing failure rate or massive resource usage demonstrated in long-running software systems such as web servers. It was reported that software aging has a significant relationship with resource usage. To study the software aging phenomenon in web servers, we built an experimental platform with a server and multiple clien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Unanticipated Runtime Adaptation of Java Applications

    Publication Year: 2008, Page(s):85 - 92
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Modifying an application usually means to stop the application, apply the changes, and start the application again. That means, the application is not available for at least a short time period. This is not acceptable for highly available applications. One reasonable approach which faces the problem of unavailability is to change highly available applications at runtime. To allow extensive runtime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctness of Request Executions in Online Updates of Concurrent Object Oriented Programs

    Publication Year: 2008, Page(s):93 - 100
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Online update is a technique that reduces the disruption caused by a software update. It does so by applying a patch to a running process as opposed to shutting down the process and restarting it. The challenge here lies in ensuring correct operation during and after the update. In this paper, we present the correctness criteria involved in such situations and a solution to performing updates safe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risks and Risk Management in Software Architecture Evolution: An Industrial Survey

    Publication Year: 2008, Page(s):101 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    The effort that has been made to study risk management in the context of software architecture and its evolution, has so far focused on output from structured evaluations. However, earlier research shows that formal, structured evaluation is not commonly used in industry. We have performed a survey among software architects, in order to capture a more complete picture of the risk and management is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Technique to Check the Implementability of Behavioral Specifications with Frameworks

    Publication Year: 2008, Page(s):111 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    In software development with frameworks, it is essential to use the framework with which given software requirements are implementable. This paper focuses on use cases as the requirements specifications and proposes a technique to check whether the given use cases are implementable with the framework. To check the implementability, consistency of branch conditions of the frameworks and the require... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.